SlideShare a Scribd company logo
1 of 49
Manchester 2013 1
Fred Piper
Information Security Group
Cryptography
From Black Art
to
Popular Science
Fred Piper
Codes & Ciphers Ltd
12 Duncan Road, Richmond
Surrey, TW9 2JD
Royal Holloway, University of London
Egham Hill, Egham
Surrey TW20 0EX
f.piper@rhul.ac.uk
www.isg.rhul.ac.uk
Aims of Lecture
• To enjoy ourselves
• To look at some implementation issues for
cryptographic systems
• To see how cryptography has changed in the
last 40 years
Manchester 2013 3
Industry’s Problems with Implementing
Cryptography
• No real problems with algorithms – it’s the wraparounds
• Serious concerns about some recent events – DigiNotar, RSA
• Not sure how they should be regarding possibility of quantum
computers
• Cryptography needs standards (change slowly), but we need
flexibility
• Need for early warning about necessary changes (e.g. key
lengths)
• Concerns about timeliness of hardware (cryptographers
recommend changes faster than hardware can be replaced)
Manchester 2013 4
A Little History
• Pre-1975: Hush hush!
– Practised mainly by Governments and military
• Early 1980s: Courses start
– Customers start to know what they require
• Early 1990s: Qualifications start
– The role of security manager is no longer a
punishment
• Early 2000s: Popular science
– Everyone knows about it
• Today: Fundamental to e-commerce, e-Government
etc Manchester 2013 5
Popular Does Not Mean Easy
• Golf is a popular sport
• Anyone can swing a golf club
• Occasionally a complete novice will hit a good
tee short
• Being a professional is hard work
– Training
– practice
Manchester 2013 6
Royal Holloway: Our Most Famous Ex-Student?
Manchester 2013 7
Manchester 2013
Why is the Profile of Encryption Growing?
• Increase in volume of communications over
insecure channels
• Increased requirement for remote access to
information
• Regulatory requirements for ‘adequate’
protection of data
• Need for electronic ‘equivalent’ to handwritten
signatures and other forms of identification
• It can be fun!
8
Bletchley Park
Manchester 2013 9
Some Important Changes since 1945
• Advent of software
• Advent of fast computers
• Advent of new communications media
• Advent of binary codes
• Increase in general awareness
• Many applications other than provision of
confidentiality
• Public key cryptography
• Seen as part of a wider discipline: Information
Security Manchester 2013 10
Manchester 2013 11
What is Information Security?
Information Security includes the following three
aspects:
• Confidentiality
– Protecting information from unauthorised disclosure, perhaps to
a competitor or to the press
• Integrity
– Protecting information from unauthorised modification, and
ensuring that information, such as a customer list, can be relied
upon and is accurate and complete
• Availability
– Ensuring information is available when you need it
NOTE: Impersonating an authorised user is ofter a more effective form
of attack than ‘breaking’ the technology
Authentication
• It is important to authenticate people and
devices
• Man-in-the-Middle Attacks
• How to beat a Grand Master at chess
Manchester 2013 12
Manchester 2013
Early Definition of a Cipher System
Cryptogram
c
Key
Encryption
Algorithm
Message
m Decryption
Algorithm
Key
Message
m
Interceptor
Key establishment channel
(secure)
13
Confidentiality
How do you keep a secret?
• Don’t let anyone have access to the information
• Disguise it so that ‘unauthorised’ people cannot
understand it
– Shared secrets rely on trust
– Trust in people, processes, technology
• If you use cryptography to protect your
information then there will be a key to which
you must deny access
Manchester 2013 14
Warnings
• If that key is lost and the algorithm is strong then
your data is lost ‘forever’
• If someone else gains access to that key then
they almost certainly have access to your
information
Manchester 2013 15
Breaking an Algorithm
• Being able to determine plaintext from ciphertext
without being given key
• Exhaustive key search is always (theoretically)
possible
Well Designed (Symmetric) Algorithm
• ‘Easiest’ attack is exhaustive key search
Strong Algorithm
• Well designed with a large number of keys
Note: History is full of instances where algorithms were
assumed to be well designed but ……
Manchester 2013 16
Breaking a Security System
• ‘Broken’ is an emotive term
• Attacks often work only in unrealistic conditions
chosen by attacker
• Always understand assumptions associated with the
term
• For algorithms:
– Ciphertext only
– Known plaintext attack
– Chosen plaintext attack
Manchester 2013 17
The ‘Secure Channel’ Concept
AIM: To send information securely over an insecure
network
•We achieve this by building a “secure channel”
between two end points on the network
•Typically offering:
–Data origin authentication
–Data integrity
–Confidentiality
•Cryptography is an important tool
18Manchester 2013
Attacking Cryptographic Systems
•Passive interceptor attempts to break algorithm
•Active interceptor has more options
•Interception not necessarily the ‘best’ form of attack
– Attack protocols
– Attack key management
– Attack the hardware
– Impersonate genuine users
– Espionage
Manchester 2013 19
Manchester 2013
Is PK Cryptography built on a ‘sound’
basis?
“Many cryptographic systems rely on the inability
of mathematicians to do mathematics”.
(Donald Davies: LMS Lecture)
Tongue in cheek?
Existence proofs do not provide solutions
Algorithms should be implementable
20
Are Today’s Algorithms ‘Future Proof’?
• Symmetric algorithms
–if well designed then key searches are ‘best’ attacks
–Main concern is advances in technology
–Moore’s Law
• Asymmetric algorithm
–Always concerned about mathematical advances
–Quantum computing
• Hash functions
–Confidence shaken
21Manchester 2013
A Never Ending Debate
• What gives us confidence in an algorithm?
–Standards?
–Ask the opinions of experts?
• Early debate
–Publicly known or proprietary algorithms?
–Less of an issue now than in the 1980s
WARNING
The fact that an algorithm is published and unbroken
says nothing about its strength
Manchester 2013 22
Kerchoff’s Principle
• The security of a cryptographic system should not depend on
keeping the encryption algorithm secret
It does not say
• The encryption algorithm should be made public
However
• Anyone assessing the security of a cryptographic system needs
to have confidence that the algorithm is strong
So:
• Financial institutions should use public algorithms where
appropriate
Manchester 2013 23
It is NOT just about Algorithms
Early 1980s:
• Thorn EMI conference
“Security is People”
Early 1990s:
• Ross Anderson’s paper
“Why crypto systems fail”
Manchester 2013 24
A Fact of Life !
• In theory there is no difference between
theory and practice. In practice there is.
Manchester 2013 25
RSA: The Theory
• The published modulus is the product of 2 secret
primes
• Knowledge of the secret primes makes it easy to
find the private key
• In general, determining the private key appears
to require knowledge of the primes
• Factorisation is difficult
• So, for large moduli, RSA is secure
Manchester 2013 26
Attacks on RSA
The theory assumes that the attacker will need to
factor n using a mathematical factorisation
algorithm
In practice this may not be so
EARLY ATTACKS
Attack prime generator rather than try to factor n
mathematically
(1) Exhaustive prime search
(2) Exploit bias in generation process
Manchester 2013 27
Progress?
• So have we learnt from these early mistakes?
In theory: YES
In practice: NO
Manchester 2013 28
‘Shared’ Primes
• Factoring RSA moduli is very difficult
• Finding g.c.d. of two RSA moduli is easy
• Factoring two RSA moduli which share a prime
factor is easy
• Recent research showed that, for a sample 6.6
million RSA keys, over 4% either have a
common modulus or gave moduli sharing a
common prime factor
• Suspect prime generators?
Manchester 2013 29
“Ron was wrong, Whit is right”
“When exploited it could affect the expectation that
the public key infrastructure is intended to achieve”
(Arjen K Lenstra, James P Hughes et al)
Manchester 2013 30
Cryptographic Systems
• The use of strong algorithms prevents attackers
from calculating or guessing keys
• Keys need to be stored and/or distributed
throughout the system
• Keys need protection
Manchester 2013 31
Protecting Keys (Storage or Distribution)
• Physical security
– Tamper Resistant Security Module (TRSM)
– Tokens (Smart Cards)
• Components
– Secret Sharing Scheme
• Key hierarchies
– Keys encrypted using other keys
– Lower level keys derived from higher level ones
Manchester 2013 32
Side Channel Attacks (1)
To find a cryptographic key
• Exhaustive key search attacks try to find the
secret key by random trial and error
• Side channel attacks try to use additional
information drawn from the physical
implementation of the cryptographic algorithm at
hand so as to be substantially better than trial
and error
Manchester 2013 33
Side Channel Attacks (2)
• Changed the way cryptographers think about
security
– Properties of digital circuits are far more important for
security than was previously believed
• Many previous design approaches recognised as inadequate
Manchester 2013 34
Some Recent ‘Changes’
• More attacks concentrate on the implementation of
the algorithm and the accompanying protocols
• Some exploit error messages
• Academic research is becoming less ‘blue skies’ and
focussing on real systems/problems
• Theory and practice are getting closer to each other
Manchester 2013 35
Error Messages
ATM transaction
• Incorrect PIN
• Insufficient funds in account
• Exceeded daily limit
Manchester 2013 36
Disclaimer: Cryptography ≠ Security
• Crypto is only a tiny piece of the security puzzle
– but an important one
• Most systems break elsewhere
– incorrect requirements or specifications
– implementation errors
– application level
– social engineering
37Manchester 2013
Security Breaches
Many Reasons:
• Badly designed systems
• Inappropriate policies
• Human error
• Clever, innovative (technical) attacks
• Misplaced trust (e.g. In employees or trusted
third party)
Manchester 2013 38
Public Key Infrastructures
• Certification Authorities
• Sign certificates to bind user’s ID to their public
key
• Hierarchy of CAs
• Root CA at top of hierarchy
NOTE: If root CA’s private key is compromised
then the entire PKI is affected
Manchester 2013 39
DigiNotar
• Netherlands based CA
• Host many other CAs
– SSL certificates
– Qualified certificates
– Government accredited
• Hackers gained unauthorised access to their CA servers
• Issued series of rogue certificates
SERIOUS BREACH: DigiNotar root certificate was trusted
by most widely used web browsers and email clients
Hacker set up spoof websites (e.g. Googlemail)
Manchester 2013 40
Problem
• Who, or what, can we trust?
Manchester 2013 41
Protocol Security (1)
In recent work analysing Internet protocols:
• A design flaw in SSH leading to a plaintext recovery
attack against OpenSSH
– Recovering 32 bits of plaintext with probability 2-14
• Plaintext recovery attacks against all MAC-then-
encrypt configurations of IPsec
– Recovering all protected IP traffic
• A (minor) flaw in SSL/TLS leading to a distinguishing
attack which breaks the design goals of the protocol
– Can tell whether ‘yes’ or ‘no’ is encrypted in the channel!
42Manchester 2013
Protocol Security (2)
• In all cases the cryptographic algorithms are secure
but the protocols are insecure
• The attacks illustrate the gap between theory and
practice in cryptography and protocol design
• More details at www.isg.rhul.ac.uk/~kp
43Manchester 2013
Some Things Never Change
• The widespread use of encryption for confidentiality
has always been a cause of concern for Governments
• Simplified version of Government’s position
– They are happy to support the use of strong encryption for
‘good’ purposes
– Unhappy about the use of strong encryption for ‘bad’
purposes
Manchester 2013 44
Manchester 2013 45
Saints or Sinners ?
Receiver
Interceptor
Sender
Who are the ‘good’ guys ?
Manchester 2013 46
Law Enforcement’s Dilemmas
• Do not want to intrude into people’s private
lives
• Do not want to hinder e-commerce
• Want to have their own secure communications
• Occasionally use interception to obtain
information
• Occasionally need to read confiscated,
encrypted information
Loss of Control of Encryption
•Academic papers
–Attacks on DES
–New algorithms
•Text books
•Need for international systems
47Manchester 2013
Newton Minow, Speech to the Association of
American Law Schools, 1985
•After 35 years, I have finished a comprehensive study of
European comparative law
•In Germany, under the law, everything is prohibited, except
that which is permitted
•In France, under the law, everything is permitted, except that
which is prohibited
•In the Soviet Union, under the law, everything is prohibited,
including that which is permitted
•And in Italy, under the law, everything is permitted, especially
that which is prohibited
48Manchester 2013
Manchester 2013
Future Developments ?
• Steganography
– You hide information rather than distort it
– Harder to detect?
• Quantum
– Quantum key establishment
– Quantum cryptography
– Quantum computing
• Provable security
– Academic ‘dream’ or reality?
• Default encryption
– Who looks after keys? (liability issues)
49

More Related Content

What's hot

Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญBAINIDA
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญBAINIDA
 
Cyber Threat Intelligence - La rilevanza del dato per il business
Cyber Threat  Intelligence - La rilevanza del dato per il businessCyber Threat  Intelligence - La rilevanza del dato per il business
Cyber Threat Intelligence - La rilevanza del dato per il businessFrancesco Faenzi
 
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillThe Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillFrode Hommedal
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakaleAakash Takale
 
Exploring the Real-World Application Security Top 10
Exploring the Real-World Application Security Top 10Exploring the Real-World Application Security Top 10
Exploring the Real-World Application Security Top 10Priyanka Aash
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
 
2015 Global APT Summit Matthew Rosenquist
2015 Global APT Summit Matthew Rosenquist2015 Global APT Summit Matthew Rosenquist
2015 Global APT Summit Matthew RosenquistMatthew Rosenquist
 
Information security
Information securityInformation security
Information securityVarshil Patel
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightDeep Shankar Yadav
 
Jim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for CybersecurityJim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for Cybersecurityidsecconf
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceZaiffiEhsan
 
Wireless Security Audits
Wireless Security AuditsWireless Security Audits
Wireless Security AuditsCyber 51 LLC
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingDhruv Majumdar
 

What's hot (20)

Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
Cyber Threat Intelligence - La rilevanza del dato per il business
Cyber Threat  Intelligence - La rilevanza del dato per il businessCyber Threat  Intelligence - La rilevanza del dato per il business
Cyber Threat Intelligence - La rilevanza del dato per il business
 
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillThe Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
 
Exploring the Real-World Application Security Top 10
Exploring the Real-World Application Security Top 10Exploring the Real-World Application Security Top 10
Exploring the Real-World Application Security Top 10
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
 
2015 Global APT Summit Matthew Rosenquist
2015 Global APT Summit Matthew Rosenquist2015 Global APT Summit Matthew Rosenquist
2015 Global APT Summit Matthew Rosenquist
 
Cryptography
CryptographyCryptography
Cryptography
 
Information security
Information securityInformation security
Information security
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
Jim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for CybersecurityJim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for Cybersecurity
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Wireless Security Audits
Wireless Security AuditsWireless Security Audits
Wireless Security Audits
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 

Similar to Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Popular Science

CNS ASSIGNMENT 2 TEAM 1.pptx
CNS ASSIGNMENT 2 TEAM 1.pptxCNS ASSIGNMENT 2 TEAM 1.pptx
CNS ASSIGNMENT 2 TEAM 1.pptxKannanN45
 
Security testing fundamentals - must need basics to learn Penetration Testing
Security testing fundamentals - must need basics to learn Penetration TestingSecurity testing fundamentals - must need basics to learn Penetration Testing
Security testing fundamentals - must need basics to learn Penetration TestingHaribabu Nandyal Padmanaban
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdfwondimagegndesta
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackMona Rajput
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxNune SrinivasRao
 
04 authentication
04 authentication04 authentication
04 authenticationJadavsejal
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentalsManesh T
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxSamiDan3
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer SystemManesh T
 
Information-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptxInformation-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptxanbersattar
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Security Innovation
 
Cryptographic Protocol is and isn't like LEGO.
Cryptographic Protocol is and isn't like LEGO.Cryptographic Protocol is and isn't like LEGO.
Cryptographic Protocol is and isn't like LEGO.Shin'ichiro Matsuo
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural StyleThreat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural StyleDharmalingam Ganesan
 

Similar to Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Popular Science (20)

CNS ASSIGNMENT 2 TEAM 1.pptx
CNS ASSIGNMENT 2 TEAM 1.pptxCNS ASSIGNMENT 2 TEAM 1.pptx
CNS ASSIGNMENT 2 TEAM 1.pptx
 
Security testing fundamentals - must need basics to learn Penetration Testing
Security testing fundamentals - must need basics to learn Penetration TestingSecurity testing fundamentals - must need basics to learn Penetration Testing
Security testing fundamentals - must need basics to learn Penetration Testing
 
Security Fundamentals
Security FundamentalsSecurity Fundamentals
Security Fundamentals
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic Attack
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
04 authentication
04 authentication04 authentication
04 authentication
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
NETWORK SECURITY
NETWORK SECURITY NETWORK SECURITY
NETWORK SECURITY
 
Information-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptxInformation-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptx
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
Cryptographic Protocol is and isn't like LEGO.
Cryptographic Protocol is and isn't like LEGO.Cryptographic Protocol is and isn't like LEGO.
Cryptographic Protocol is and isn't like LEGO.
 
Introduction multiparty computation
Introduction multiparty computationIntroduction multiparty computation
Introduction multiparty computation
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural StyleThreat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Popular Science

  • 1. Manchester 2013 1 Fred Piper Information Security Group
  • 2. Cryptography From Black Art to Popular Science Fred Piper Codes & Ciphers Ltd 12 Duncan Road, Richmond Surrey, TW9 2JD Royal Holloway, University of London Egham Hill, Egham Surrey TW20 0EX f.piper@rhul.ac.uk www.isg.rhul.ac.uk
  • 3. Aims of Lecture • To enjoy ourselves • To look at some implementation issues for cryptographic systems • To see how cryptography has changed in the last 40 years Manchester 2013 3
  • 4. Industry’s Problems with Implementing Cryptography • No real problems with algorithms – it’s the wraparounds • Serious concerns about some recent events – DigiNotar, RSA • Not sure how they should be regarding possibility of quantum computers • Cryptography needs standards (change slowly), but we need flexibility • Need for early warning about necessary changes (e.g. key lengths) • Concerns about timeliness of hardware (cryptographers recommend changes faster than hardware can be replaced) Manchester 2013 4
  • 5. A Little History • Pre-1975: Hush hush! – Practised mainly by Governments and military • Early 1980s: Courses start – Customers start to know what they require • Early 1990s: Qualifications start – The role of security manager is no longer a punishment • Early 2000s: Popular science – Everyone knows about it • Today: Fundamental to e-commerce, e-Government etc Manchester 2013 5
  • 6. Popular Does Not Mean Easy • Golf is a popular sport • Anyone can swing a golf club • Occasionally a complete novice will hit a good tee short • Being a professional is hard work – Training – practice Manchester 2013 6
  • 7. Royal Holloway: Our Most Famous Ex-Student? Manchester 2013 7
  • 8. Manchester 2013 Why is the Profile of Encryption Growing? • Increase in volume of communications over insecure channels • Increased requirement for remote access to information • Regulatory requirements for ‘adequate’ protection of data • Need for electronic ‘equivalent’ to handwritten signatures and other forms of identification • It can be fun! 8
  • 10. Some Important Changes since 1945 • Advent of software • Advent of fast computers • Advent of new communications media • Advent of binary codes • Increase in general awareness • Many applications other than provision of confidentiality • Public key cryptography • Seen as part of a wider discipline: Information Security Manchester 2013 10
  • 11. Manchester 2013 11 What is Information Security? Information Security includes the following three aspects: • Confidentiality – Protecting information from unauthorised disclosure, perhaps to a competitor or to the press • Integrity – Protecting information from unauthorised modification, and ensuring that information, such as a customer list, can be relied upon and is accurate and complete • Availability – Ensuring information is available when you need it NOTE: Impersonating an authorised user is ofter a more effective form of attack than ‘breaking’ the technology
  • 12. Authentication • It is important to authenticate people and devices • Man-in-the-Middle Attacks • How to beat a Grand Master at chess Manchester 2013 12
  • 13. Manchester 2013 Early Definition of a Cipher System Cryptogram c Key Encryption Algorithm Message m Decryption Algorithm Key Message m Interceptor Key establishment channel (secure) 13
  • 14. Confidentiality How do you keep a secret? • Don’t let anyone have access to the information • Disguise it so that ‘unauthorised’ people cannot understand it – Shared secrets rely on trust – Trust in people, processes, technology • If you use cryptography to protect your information then there will be a key to which you must deny access Manchester 2013 14
  • 15. Warnings • If that key is lost and the algorithm is strong then your data is lost ‘forever’ • If someone else gains access to that key then they almost certainly have access to your information Manchester 2013 15
  • 16. Breaking an Algorithm • Being able to determine plaintext from ciphertext without being given key • Exhaustive key search is always (theoretically) possible Well Designed (Symmetric) Algorithm • ‘Easiest’ attack is exhaustive key search Strong Algorithm • Well designed with a large number of keys Note: History is full of instances where algorithms were assumed to be well designed but …… Manchester 2013 16
  • 17. Breaking a Security System • ‘Broken’ is an emotive term • Attacks often work only in unrealistic conditions chosen by attacker • Always understand assumptions associated with the term • For algorithms: – Ciphertext only – Known plaintext attack – Chosen plaintext attack Manchester 2013 17
  • 18. The ‘Secure Channel’ Concept AIM: To send information securely over an insecure network •We achieve this by building a “secure channel” between two end points on the network •Typically offering: –Data origin authentication –Data integrity –Confidentiality •Cryptography is an important tool 18Manchester 2013
  • 19. Attacking Cryptographic Systems •Passive interceptor attempts to break algorithm •Active interceptor has more options •Interception not necessarily the ‘best’ form of attack – Attack protocols – Attack key management – Attack the hardware – Impersonate genuine users – Espionage Manchester 2013 19
  • 20. Manchester 2013 Is PK Cryptography built on a ‘sound’ basis? “Many cryptographic systems rely on the inability of mathematicians to do mathematics”. (Donald Davies: LMS Lecture) Tongue in cheek? Existence proofs do not provide solutions Algorithms should be implementable 20
  • 21. Are Today’s Algorithms ‘Future Proof’? • Symmetric algorithms –if well designed then key searches are ‘best’ attacks –Main concern is advances in technology –Moore’s Law • Asymmetric algorithm –Always concerned about mathematical advances –Quantum computing • Hash functions –Confidence shaken 21Manchester 2013
  • 22. A Never Ending Debate • What gives us confidence in an algorithm? –Standards? –Ask the opinions of experts? • Early debate –Publicly known or proprietary algorithms? –Less of an issue now than in the 1980s WARNING The fact that an algorithm is published and unbroken says nothing about its strength Manchester 2013 22
  • 23. Kerchoff’s Principle • The security of a cryptographic system should not depend on keeping the encryption algorithm secret It does not say • The encryption algorithm should be made public However • Anyone assessing the security of a cryptographic system needs to have confidence that the algorithm is strong So: • Financial institutions should use public algorithms where appropriate Manchester 2013 23
  • 24. It is NOT just about Algorithms Early 1980s: • Thorn EMI conference “Security is People” Early 1990s: • Ross Anderson’s paper “Why crypto systems fail” Manchester 2013 24
  • 25. A Fact of Life ! • In theory there is no difference between theory and practice. In practice there is. Manchester 2013 25
  • 26. RSA: The Theory • The published modulus is the product of 2 secret primes • Knowledge of the secret primes makes it easy to find the private key • In general, determining the private key appears to require knowledge of the primes • Factorisation is difficult • So, for large moduli, RSA is secure Manchester 2013 26
  • 27. Attacks on RSA The theory assumes that the attacker will need to factor n using a mathematical factorisation algorithm In practice this may not be so EARLY ATTACKS Attack prime generator rather than try to factor n mathematically (1) Exhaustive prime search (2) Exploit bias in generation process Manchester 2013 27
  • 28. Progress? • So have we learnt from these early mistakes? In theory: YES In practice: NO Manchester 2013 28
  • 29. ‘Shared’ Primes • Factoring RSA moduli is very difficult • Finding g.c.d. of two RSA moduli is easy • Factoring two RSA moduli which share a prime factor is easy • Recent research showed that, for a sample 6.6 million RSA keys, over 4% either have a common modulus or gave moduli sharing a common prime factor • Suspect prime generators? Manchester 2013 29
  • 30. “Ron was wrong, Whit is right” “When exploited it could affect the expectation that the public key infrastructure is intended to achieve” (Arjen K Lenstra, James P Hughes et al) Manchester 2013 30
  • 31. Cryptographic Systems • The use of strong algorithms prevents attackers from calculating or guessing keys • Keys need to be stored and/or distributed throughout the system • Keys need protection Manchester 2013 31
  • 32. Protecting Keys (Storage or Distribution) • Physical security – Tamper Resistant Security Module (TRSM) – Tokens (Smart Cards) • Components – Secret Sharing Scheme • Key hierarchies – Keys encrypted using other keys – Lower level keys derived from higher level ones Manchester 2013 32
  • 33. Side Channel Attacks (1) To find a cryptographic key • Exhaustive key search attacks try to find the secret key by random trial and error • Side channel attacks try to use additional information drawn from the physical implementation of the cryptographic algorithm at hand so as to be substantially better than trial and error Manchester 2013 33
  • 34. Side Channel Attacks (2) • Changed the way cryptographers think about security – Properties of digital circuits are far more important for security than was previously believed • Many previous design approaches recognised as inadequate Manchester 2013 34
  • 35. Some Recent ‘Changes’ • More attacks concentrate on the implementation of the algorithm and the accompanying protocols • Some exploit error messages • Academic research is becoming less ‘blue skies’ and focussing on real systems/problems • Theory and practice are getting closer to each other Manchester 2013 35
  • 36. Error Messages ATM transaction • Incorrect PIN • Insufficient funds in account • Exceeded daily limit Manchester 2013 36
  • 37. Disclaimer: Cryptography ≠ Security • Crypto is only a tiny piece of the security puzzle – but an important one • Most systems break elsewhere – incorrect requirements or specifications – implementation errors – application level – social engineering 37Manchester 2013
  • 38. Security Breaches Many Reasons: • Badly designed systems • Inappropriate policies • Human error • Clever, innovative (technical) attacks • Misplaced trust (e.g. In employees or trusted third party) Manchester 2013 38
  • 39. Public Key Infrastructures • Certification Authorities • Sign certificates to bind user’s ID to their public key • Hierarchy of CAs • Root CA at top of hierarchy NOTE: If root CA’s private key is compromised then the entire PKI is affected Manchester 2013 39
  • 40. DigiNotar • Netherlands based CA • Host many other CAs – SSL certificates – Qualified certificates – Government accredited • Hackers gained unauthorised access to their CA servers • Issued series of rogue certificates SERIOUS BREACH: DigiNotar root certificate was trusted by most widely used web browsers and email clients Hacker set up spoof websites (e.g. Googlemail) Manchester 2013 40
  • 41. Problem • Who, or what, can we trust? Manchester 2013 41
  • 42. Protocol Security (1) In recent work analysing Internet protocols: • A design flaw in SSH leading to a plaintext recovery attack against OpenSSH – Recovering 32 bits of plaintext with probability 2-14 • Plaintext recovery attacks against all MAC-then- encrypt configurations of IPsec – Recovering all protected IP traffic • A (minor) flaw in SSL/TLS leading to a distinguishing attack which breaks the design goals of the protocol – Can tell whether ‘yes’ or ‘no’ is encrypted in the channel! 42Manchester 2013
  • 43. Protocol Security (2) • In all cases the cryptographic algorithms are secure but the protocols are insecure • The attacks illustrate the gap between theory and practice in cryptography and protocol design • More details at www.isg.rhul.ac.uk/~kp 43Manchester 2013
  • 44. Some Things Never Change • The widespread use of encryption for confidentiality has always been a cause of concern for Governments • Simplified version of Government’s position – They are happy to support the use of strong encryption for ‘good’ purposes – Unhappy about the use of strong encryption for ‘bad’ purposes Manchester 2013 44
  • 45. Manchester 2013 45 Saints or Sinners ? Receiver Interceptor Sender Who are the ‘good’ guys ?
  • 46. Manchester 2013 46 Law Enforcement’s Dilemmas • Do not want to intrude into people’s private lives • Do not want to hinder e-commerce • Want to have their own secure communications • Occasionally use interception to obtain information • Occasionally need to read confiscated, encrypted information
  • 47. Loss of Control of Encryption •Academic papers –Attacks on DES –New algorithms •Text books •Need for international systems 47Manchester 2013
  • 48. Newton Minow, Speech to the Association of American Law Schools, 1985 •After 35 years, I have finished a comprehensive study of European comparative law •In Germany, under the law, everything is prohibited, except that which is permitted •In France, under the law, everything is permitted, except that which is prohibited •In the Soviet Union, under the law, everything is prohibited, including that which is permitted •And in Italy, under the law, everything is permitted, especially that which is prohibited 48Manchester 2013
  • 49. Manchester 2013 Future Developments ? • Steganography – You hide information rather than distort it – Harder to detect? • Quantum – Quantum key establishment – Quantum cryptography – Quantum computing • Provable security – Academic ‘dream’ or reality? • Default encryption – Who looks after keys? (liability issues) 49

Editor's Notes

  1. A diagrammatic definition of a cipher system used to provide confidentiality for information that is transmitted over an insecure channel. The object of the exercise is to ensure that if an interceptor obtains the cryptogram then he cannot deduce the message. NOTE that encrypting the information does not prevent interception. Instead it ensures that the unauthorised interceptor cannot understand what he has intercepted.
  2. There are many ways of protecting keys. Nevertheless key distribution is one of the most difficult aspects of key management.
  3. There are situations where the ‘good’ guys are the people communicating. However Law Enforcement and Government Agencies etc often need to intercept.